Optimal Secure Two-Layer IoT Network Design

Juntao Chen, Corinne Touati, Quanyan Zhu

Research output: Contribution to journalArticlepeer-review

Abstract

With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally two layers with the cloud and cellular networks coexisting with the underlaid device-to-device communications. The connectivity of IoTs plays an important role in information dissemination for mission-critical and civilian applications. However, IoT communication networks are vulnerable to cyber attacks including the denial-of-service and jamming attacks, resulting in link removals in the IoT network. In this paper, we develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication paths between two nodes or secure links against attacks by investing resources. By anticipating the strategic cyber attacks, we characterize the optimal design of the secure IoT network by first providing a lower bound on the number of links a secure network requires for a given budget of protected links, and then developing a method to construct networks that satisfy the heterogeneous network design specifications. Therefore, each layer of the designed heterogeneous IoT network is resistant to a predefined level of malicious attacks with minimum resources. Finally, we provide case studies on the Internet of Battlefield Things to corroborate and illustrate our obtained results.

Original languageEnglish (US)
Article number8673619
Pages (from-to)398-409
Number of pages12
JournalIEEE Transactions on Control of Network Systems
Volume7
Issue number1
DOIs
StatePublished - Mar 2020

Keywords

  • Connectivity
  • Internet of Battlefield Things (IoBT)
  • optimal design
  • security
  • two-layer networks

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Optimal Secure Two-Layer IoT Network Design'. Together they form a unique fingerprint.

Cite this